Sep 07, 2012
A Guide to Network Vulnerability Management
When it comes to security, there are no perfect networks and no perfect applications. Detecting key holes in your defenses doesn’t actually have to be an expensive or complex proposition. You could certainly spend a lot of money building a robust and real-time network vulnerability capability if you wanted to, but you don’t even have to spend any money to get going.
Network vulnerability management at Company A may look drastically different than it will at Company B, based on the type of company assets that must be protected and where they are located. There’s no one-size-fits-all template or best practice that will protect you from every vulnerability that you face. But with diligence and planning, vulnerability management can be turned into a process that can help you identify potentially disastrous security holes before an attacker does.
In this report, we recommend tools and best practices for building out an effective network vulnerability assessment and management system. (S5660912)